Reference no: EM131240488
Read Case Study 3-3: United Thermostatic Controls in Chapter 3, page 156 of your text.
In two to three pages, supported by evidence from your text and from other research (at least one resource is required), answer the following questions:
1. Identify the stakeholders in this case. Identify their interests and United's obligations to satisfy those interests from an ethical perspective.
2. Describe the ethical responsibilities of Tony Cupertino as a CPA and CIA. How do these responsibilities effect whom Cupertino should approach in United based on the organization chart?
3. Assume Tony Cupertino decides to delay contacting Walter Hayward and, instead, Cupertino contacts the CFO of Bilco Corporation and offers a 20 percent discount on the total $130,000 cost of merchandise if Bilco agrees to approve the partial shipment on December 30, 2013. Cupertino adds that the $26,000 would be deducted from the remaining $65,000 to be shipped during January 2014. Evaluate Cupertino's actions with respect to the following:
- Is the offer ethical or unethical? Why?
- Has Cupertino violated any of his reporting responsibilities in directly contacting the CFO of Bilco?
The paper
• Must be two to three double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center.
• Must include a separate title page with the following:
o Title of paper
o Student's name
o Course name and number
o Instructor's name
o Date submitted
• Must use at least two scholarly sources in addition to the course text.
• Must document all sources in APA style as outlined in the Ashford Writing Center.
• Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
Complete a security vulnerability report
: Complete a security vulnerability report based on your chosen organization from the Week One assignment. (chosen organization is Walmart) Consider people, processes, and technology that can be exploited by the source of a threat.
|
How incidents will be handled to support their services
: You are working for a company that provides consulting services for customers surrounding IT auditing. Your customer has asked you to explain how incidents will be handled to support their services.
|
Discuss how pointer arithmetic may be used to access
: Discuss how pointer arithmetic may be used to access the elements of an array. What is a memory leak, and what kinds of problems could not properly deallocating memory create in a program or for an operating system?
|
Example of applications of ip telephony
: Examples of applications of IP Telephony - Advanced Intelligent Network Features (AIN): It includes features such as caller ID, voice mail, call waiting, call blocking and IP Telephony is implemented using distributed architecture and centralized arc..
|
Is the offer ethical or unethical and why
: Is the offer ethical or unethical? Why? Has Cupertino violated any of his reporting responsibilities in directly contacting the CFO of Bilco?
|
Exchange around the world
: You are the assistant publicist for a best-selling international author who wrote an adventure novel about an improbable around-the-world trip. To promote her new novel, she will leave on a multi-city book tour. Her publisher created an Access dat..
|
Provide the codification citation to the authority
: Based on the facts presented, provide a brief statement of the issue to be researched. - Provide the Codification citation to the authority that resolves the research issue-be specific.
|
Number of different applications for communication
: The company uses a number of different applications for communication, accounting, and management. All the applications are hosted on individual servers with disks configured as RAID 0.
|
Explain failure to appropriately include the factor
: You must also explain whether failure to appropriately include the factor in the calculation would result in overstating or understating the net present value of the project.
|